SlideShare a Scribd company logo
1 of 2
Download to read offline
Cybersecurity
In a series of speeches earlier this year, Commodity Futures Trading Commission Chairman Timothy
Massad repeated the remark that cybersecurity has become “perhaps the single most important
new risk to market integrity and financial stability.” Indeed, with high-profile data breaches seemingly
happening more frequently, cybersecurity has become an area of greater emphasis for companies
and regulators alike.
How can Lexis® Securities Mosaic® help?
Securities Mosaic®
allows you to conduct research or stay current on a specific topic like cybersecurity across a
broad spectrum of materials from a single gateway. Below are some examples.
Guidance
• In April 2014, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) announced a series of
examinations aimed at identifying cybersecurity risks and assessing cybersecurity preparedness in the securities
industry. Following up on that initiative, OCIE recently issued a Risk Alert providing information on the areas of
focus for the second round of cybersecurity examinations of broker-dealers and investment advisers. These
examinations will involve more testing to assess implementation of firm procedures and controls, and will focus
on governance and risk assessment; access rights and controls; data loss prevention; vendor management;
training; and incident response.
• In Comment Letter review of filings, SEC examiners may ask a company to clarify the technological and
administrative procedures it has in place to ensure privacy and security, or to spell out the risks and potential
costs of a cyber attack or breach.
• In the past two years, not just the SEC but the IRS, Federal Reserve Board, EPA and FDA have offered official
guidance or assessment tools in the area of cybersecurity. Find them on Lexis Securities Mosaic by going to our
Laws, Rules, Agencies page, searching on “cybersecurity,” and narrowing by the “Guidance” category filter.
Disclosure
• Risk Factors. Risks disclosed to prospective and current shareholders via periodic reports and in registrations
of securities offerings are always a barometer of trending topics. Recently, it has become common practice for
companies that maintain access to sensitive or confidential data to disclose risks of potential data breaches or
security concerns.
• Management’s Discussion & Analysis. When cyber attacks—or even the mere threat of such attacks—impact a
company’s bottom line, it will merit discussion in the MD&A section of the annual report.
• Proxy statements. Cybersecurity has become a concern at companies’ annual meetings, as companies seek to
adopt and refine risk mitigation policies and procedures. The issue can even impact the election of directors and
officers, as a candidate’s credentials in the area of cybersecurity may be perceived as increasingly important.
Rulemaking
• Earlier this year, the SEC formalized certain security standards for exchange-listed companies with the adoption
of its final rule 34-73639 on Regulation Systems Compliance and Integrity (“SCI”).
• In August, the National Futures Association submitted to the CFTC a proposed interpretive notice focused on
cybersecurity. If approved by the CFTC, NFA members would be required to adopt written procedures to keep
customer data secure and safeguard access to members’ electronic systems.
Lexis®
Securities Mosaic®
Enforcement
• In late September, the SEC announced its first enforcement action related to cybersecurity, fining an
investment adviser for failing to establish required policies and procedures in advance of a breach that
compromised the personally identifiable information (“PII”) of approximately 100,000 individuals, including
thousands of the firm’s clients. Without admitting or denying the allegations, R.T. Jones Capital Equities
Management consented to the entry of an order finding that it violated Regulation S-P’s PII safeguard rules during
a nearly four-year period when it failed to adopt any written policies and procedures to ensure the security and
confidentiality of PII and protect it from anticipated threats or unauthorized access. The firm will pay a $75,000
penalty.
News and Commentary
• Stay well-informed on everything related to securities. Subscribe to our Daily Securities News in your inbox
each morning. This comprehensive newsletter includes SEC updates, corporate and securities news stories
from an assortment of notable world news sources, recent law firm memos, market regulation updates, pending
securities legislation, SEC enforcement and an SEC Final Rules effective date calendar.
• Check out what the top U.S. law firms are saying. Go to our database of over 100,000 Law Firm Memos and
type in relevant keywords (e.g., “cybersecurity,” “data breach”). Set up a daily alert to automatically receive the
results of your personalized search in your inbox.
• See what other influential analysts are saying. Sign up for our Securities Mosaic Blogwatch email, which
includes opinion and analysis from well-respected sources such as CorporateCounsel. net and the Harvard Law
School Forum on Corporate Governance and Financial Regulation. You can also text-search the past six months
of content in our Blogwatch archive.
Learn more about Lexis Securities Mosaic and how it can support your business today.		
	 Contact us.
	 866.650.3600
	 www.lexisnexis.com/lsmsupport
LexisNexis, Lexis and the Knowledge Burst logo are registered trademarks of Reed
Elsevier Properties Inc., used under license. Securities Mosaic is a registered trademark of
LexisNexis, a division of Reed Elsevier Inc. Other products or services may be trademarks or
registered trademarks of their respective companies.
© 2015 LexisNexis. All rights reserved. 1015

More Related Content

What's hot

A Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for BusinessA Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for BusinessParsons Behle & Latimer
 
Respond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security reqRespond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security reqSHIVA101531
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...DATUM LLC
 
It Security Overview
It Security OverviewIt Security Overview
It Security Overviewjoegleinser
 
Wilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity CompanyWilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity Companywilsonconsulting1
 
Find the best cyebersecurity services
Find the best cyebersecurity servicesFind the best cyebersecurity services
Find the best cyebersecurity serviceswilsonconsulting1
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glbaguestfd062
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Jan Carroza
 
MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Fairfax
 
Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? N-iX
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCapgemini
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicRobert Stones
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityMarkLogic
 
dcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One PagerdcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One PagerdcVAST
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XDave James
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityGareth Niblett
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 

What's hot (20)

A Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for BusinessA Primer on U.S. Privacy and Security Law for Business
A Primer on U.S. Privacy and Security Law for Business
 
Respond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security reqRespond to the following in a minimum of 175 words security req
Respond to the following in a minimum of 175 words security req
 
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
GDPR Audit Resilience: How to Align Diverse Internal Stakeholder Needs and De...
 
It Security Overview
It Security OverviewIt Security Overview
It Security Overview
 
Brochure: Lexis Diligence
Brochure: Lexis Diligence Brochure: Lexis Diligence
Brochure: Lexis Diligence
 
Wilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity CompanyWilson Consulting Group: A Cybersecurity Company
Wilson Consulting Group: A Cybersecurity Company
 
Find the best cyebersecurity services
Find the best cyebersecurity servicesFind the best cyebersecurity services
Find the best cyebersecurity services
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glba
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
IRBsearch | GLBA data
IRBsearch | GLBA dataIRBsearch | GLBA data
IRBsearch | GLBA data
 
MFX Cybersecurity Services flyer
MFX Cybersecurity Services flyerMFX Cybersecurity Services flyer
MFX Cybersecurity Services flyer
 
Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing? Is Ukraine safe for software development outsourcing?
Is Ukraine safe for software development outsourcing?
 
CWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trustCWIN17 New-York / earning the currency of trust
CWIN17 New-York / earning the currency of trust
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
 
dcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One PagerdcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One Pager
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List X
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic Security
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 

Viewers also liked

World history knowledge map
World history knowledge mapWorld history knowledge map
World history knowledge mapJoe McClung
 
Пути развития BIM технологий при проектировании объектов инфраструктуры транс...
Пути развития BIM технологий при проектировании объектов инфраструктуры транс...Пути развития BIM технологий при проектировании объектов инфраструктуры транс...
Пути развития BIM технологий при проектировании объектов инфраструктуры транс...Tanya Gadzevych
 
Organizational behaviour_Team Development
Organizational behaviour_Team DevelopmentOrganizational behaviour_Team Development
Organizational behaviour_Team DevelopmentKanav N. Sahgal
 
изо 7 кл. урок 3. цвет элемент композиционного творчества
изо 7 кл. урок 3. цвет  элемент композиционного творчестваизо 7 кл. урок 3. цвет  элемент композиционного творчества
изо 7 кл. урок 3. цвет элемент композиционного творчестваOlgaPetrovnaKlimenkova
 
Пользовательская адаптация Autodesk Civil 3D для проектирования внешних сетей...
Пользовательская адаптация Autodesk Civil 3D для проектирования внешних сетей...Пользовательская адаптация Autodesk Civil 3D для проектирования внешних сетей...
Пользовательская адаптация Autodesk Civil 3D для проектирования внешних сетей...Tanya Gadzevych
 
Anejo a menciona
Anejo a mencionaAnejo a menciona
Anejo a mencionaJose Acosta
 
Времена года в Царском Селе
Времена года в Царском СелеВремена года в Царском Селе
Времена года в Царском СелеOlgaPetrovnaKlimenkova
 
Medicion y evaluacion entrevista clinica
Medicion y evaluacion entrevista clinicaMedicion y evaluacion entrevista clinica
Medicion y evaluacion entrevista clinicaAlcalinovoa
 
Intervenção do homem nos subsistemas terrestres
Intervenção do homem nos subsistemas terrestresIntervenção do homem nos subsistemas terrestres
Intervenção do homem nos subsistemas terrestresMariana Cordeiro
 
Six Steps to Building a Content Strategy
Six Steps to Building a Content StrategySix Steps to Building a Content Strategy
Six Steps to Building a Content StrategyErin Norvell
 

Viewers also liked (16)

World history knowledge map
World history knowledge mapWorld history knowledge map
World history knowledge map
 
Ravelo
RaveloRavelo
Ravelo
 
Пути развития BIM технологий при проектировании объектов инфраструктуры транс...
Пути развития BIM технологий при проектировании объектов инфраструктуры транс...Пути развития BIM технологий при проектировании объектов инфраструктуры транс...
Пути развития BIM технологий при проектировании объектов инфраструктуры транс...
 
Organizational behaviour_Team Development
Organizational behaviour_Team DevelopmentOrganizational behaviour_Team Development
Organizational behaviour_Team Development
 
Camilo ramirez
Camilo ramirezCamilo ramirez
Camilo ramirez
 
Changing Behaviour
Changing BehaviourChanging Behaviour
Changing Behaviour
 
изо 7 кл. урок 3. цвет элемент композиционного творчества
изо 7 кл. урок 3. цвет  элемент композиционного творчестваизо 7 кл. урок 3. цвет  элемент композиционного творчества
изо 7 кл. урок 3. цвет элемент композиционного творчества
 
Пользовательская адаптация Autodesk Civil 3D для проектирования внешних сетей...
Пользовательская адаптация Autodesk Civil 3D для проектирования внешних сетей...Пользовательская адаптация Autodesk Civil 3D для проектирования внешних сетей...
Пользовательская адаптация Autodesk Civil 3D для проектирования внешних сетей...
 
coloured logo
coloured logocoloured logo
coloured logo
 
Anejo a menciona
Anejo a mencionaAnejo a menciona
Anejo a menciona
 
Времена года в Царском Селе
Времена года в Царском СелеВремена года в Царском Селе
Времена года в Царском Селе
 
Ravelo
RaveloRavelo
Ravelo
 
Medicion y evaluacion entrevista clinica
Medicion y evaluacion entrevista clinicaMedicion y evaluacion entrevista clinica
Medicion y evaluacion entrevista clinica
 
Intervenção do homem nos subsistemas terrestres
Intervenção do homem nos subsistemas terrestresIntervenção do homem nos subsistemas terrestres
Intervenção do homem nos subsistemas terrestres
 
Six Steps to Building a Content Strategy
Six Steps to Building a Content StrategySix Steps to Building a Content Strategy
Six Steps to Building a Content Strategy
 
Hidrosfera
HidrosferaHidrosfera
Hidrosfera
 

Similar to Lexis Securities Mosaic - Cybersecurity

EY thought leadership - SEC issues guidance on cybersecurity
EY thought leadership - SEC issues guidance on cybersecurityEY thought leadership - SEC issues guidance on cybersecurity
EY thought leadership - SEC issues guidance on cybersecurityJulien Boucher
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsSkoda Minotti
 
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ, Inc.
 
Primer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsPrimer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsDavid X Martin
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresEY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresJulien Boucher
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarksMatt Siltala
 
Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016John T. Araneo
 
Securities Insight: Securities Enforcement
Securities Insight: Securities EnforcementSecurities Insight: Securities Enforcement
Securities Insight: Securities EnforcementLexisNexis
 
There are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxThere are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxrandymartin91030
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapEstelaJeffery653
 
Securities Insight: Proxy Access
Securities Insight: Proxy AccessSecurities Insight: Proxy Access
Securities Insight: Proxy AccessLexisNexis
 
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021Dawn Yankeelov
 
Stratifi technologies
Stratifi technologiesStratifi technologies
Stratifi technologiesstratifi
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...NationalUnderwriter
 
Soc 2 Compliance.pdf
Soc 2 Compliance.pdfSoc 2 Compliance.pdf
Soc 2 Compliance.pdfroguelogics
 

Similar to Lexis Securities Mosaic - Cybersecurity (20)

EY thought leadership - SEC issues guidance on cybersecurity
EY thought leadership - SEC issues guidance on cybersecurityEY thought leadership - SEC issues guidance on cybersecurity
EY thought leadership - SEC issues guidance on cybersecurity
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018CBIZ Banking & Financial Services Hot Topics - January 2018
CBIZ Banking & Financial Services Hot Topics - January 2018
 
Primer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsPrimer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directors
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosuresEY - SEC Reporting update - Spotlight on cybersecurity disclosures
EY - SEC Reporting update - Spotlight on cybersecurity disclosures
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016Cyber_Security_Action_Plan_2016
Cyber_Security_Action_Plan_2016
 
Securities Insight: Securities Enforcement
Securities Insight: Securities EnforcementSecurities Insight: Securities Enforcement
Securities Insight: Securities Enforcement
 
There are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docxThere are regulatory rules that must be met as well as organizatio.docx
There are regulatory rules that must be met as well as organizatio.docx
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 
crucet1crucet2crucet
crucet1crucet2crucetcrucet1crucet2crucet
crucet1crucet2crucet
 
Securities Insight: Proxy Access
Securities Insight: Proxy AccessSecurities Insight: Proxy Access
Securities Insight: Proxy Access
 
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
 
Stratifi technologies
Stratifi technologiesStratifi technologies
Stratifi technologies
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...New York State Department of Financial Services Expands Its Cyber Focus to In...
New York State Department of Financial Services Expands Its Cyber Focus to In...
 
Soc 2 Compliance.pdf
Soc 2 Compliance.pdfSoc 2 Compliance.pdf
Soc 2 Compliance.pdf
 

More from LexisNexis

2022-California-Product-Listing.pdf
2022-California-Product-Listing.pdf2022-California-Product-Listing.pdf
2022-California-Product-Listing.pdfLexisNexis
 
2022-MidAtlantic-State-Catalog.pdf
2022-MidAtlantic-State-Catalog.pdf2022-MidAtlantic-State-Catalog.pdf
2022-MidAtlantic-State-Catalog.pdfLexisNexis
 
2022-New-York-Catalog.pdf
2022-New-York-Catalog.pdf2022-New-York-Catalog.pdf
2022-New-York-Catalog.pdfLexisNexis
 
2022-Bankruptcy-Product-Listing.pdf
2022-Bankruptcy-Product-Listing.pdf2022-Bankruptcy-Product-Listing.pdf
2022-Bankruptcy-Product-Listing.pdfLexisNexis
 
2022-Intellectual-Property-Catalog.pdf
2022-Intellectual-Property-Catalog.pdf2022-Intellectual-Property-Catalog.pdf
2022-Intellectual-Property-Catalog.pdfLexisNexis
 
2021 Washington State catalog
2021 Washington State catalog2021 Washington State catalog
2021 Washington State catalogLexisNexis
 
2021 Southwest Product Listing
2021 Southwest Product Listing2021 Southwest Product Listing
2021 Southwest Product ListingLexisNexis
 
2021 Southeastern States Product Listing
2021 Southeastern States Product Listing2021 Southeastern States Product Listing
2021 Southeastern States Product ListingLexisNexis
 
2021 Ohio Product Listing
2021 Ohio Product Listing2021 Ohio Product Listing
2021 Ohio Product ListingLexisNexis
 
2021 Illinois Product Listing
2021 Illinois Product Listing2021 Illinois Product Listing
2021 Illinois Product ListingLexisNexis
 
2021 Florida Product Listing
2021 Florida Product Listing2021 Florida Product Listing
2021 Florida Product ListingLexisNexis
 
2021 Estate Planning Catalog
2021 Estate Planning Catalog2021 Estate Planning Catalog
2021 Estate Planning CatalogLexisNexis
 
2021 California Product Listing
2021 California Product Listing2021 California Product Listing
2021 California Product ListingLexisNexis
 
2021 Workers Compensation product listing
2021 Workers Compensation product listing2021 Workers Compensation product listing
2021 Workers Compensation product listingLexisNexis
 
2020 New England Product Listing
2020 New England Product Listing2020 New England Product Listing
2020 New England Product ListingLexisNexis
 
Voss on Delaware Contract Law
Voss on Delaware Contract LawVoss on Delaware Contract Law
Voss on Delaware Contract LawLexisNexis
 
Be Confident in Your Research with LexisNexis
Be Confident in Your Research with LexisNexisBe Confident in Your Research with LexisNexis
Be Confident in Your Research with LexisNexisLexisNexis
 
Legal Research Solutions for Correctional Facilities
Legal Research Solutions for Correctional FacilitiesLegal Research Solutions for Correctional Facilities
Legal Research Solutions for Correctional FacilitiesLexisNexis
 
Real Estate Product Listing
Real Estate Product ListingReal Estate Product Listing
Real Estate Product ListingLexisNexis
 
AHLA Catalog 2019
AHLA Catalog 2019AHLA Catalog 2019
AHLA Catalog 2019LexisNexis
 

More from LexisNexis (20)

2022-California-Product-Listing.pdf
2022-California-Product-Listing.pdf2022-California-Product-Listing.pdf
2022-California-Product-Listing.pdf
 
2022-MidAtlantic-State-Catalog.pdf
2022-MidAtlantic-State-Catalog.pdf2022-MidAtlantic-State-Catalog.pdf
2022-MidAtlantic-State-Catalog.pdf
 
2022-New-York-Catalog.pdf
2022-New-York-Catalog.pdf2022-New-York-Catalog.pdf
2022-New-York-Catalog.pdf
 
2022-Bankruptcy-Product-Listing.pdf
2022-Bankruptcy-Product-Listing.pdf2022-Bankruptcy-Product-Listing.pdf
2022-Bankruptcy-Product-Listing.pdf
 
2022-Intellectual-Property-Catalog.pdf
2022-Intellectual-Property-Catalog.pdf2022-Intellectual-Property-Catalog.pdf
2022-Intellectual-Property-Catalog.pdf
 
2021 Washington State catalog
2021 Washington State catalog2021 Washington State catalog
2021 Washington State catalog
 
2021 Southwest Product Listing
2021 Southwest Product Listing2021 Southwest Product Listing
2021 Southwest Product Listing
 
2021 Southeastern States Product Listing
2021 Southeastern States Product Listing2021 Southeastern States Product Listing
2021 Southeastern States Product Listing
 
2021 Ohio Product Listing
2021 Ohio Product Listing2021 Ohio Product Listing
2021 Ohio Product Listing
 
2021 Illinois Product Listing
2021 Illinois Product Listing2021 Illinois Product Listing
2021 Illinois Product Listing
 
2021 Florida Product Listing
2021 Florida Product Listing2021 Florida Product Listing
2021 Florida Product Listing
 
2021 Estate Planning Catalog
2021 Estate Planning Catalog2021 Estate Planning Catalog
2021 Estate Planning Catalog
 
2021 California Product Listing
2021 California Product Listing2021 California Product Listing
2021 California Product Listing
 
2021 Workers Compensation product listing
2021 Workers Compensation product listing2021 Workers Compensation product listing
2021 Workers Compensation product listing
 
2020 New England Product Listing
2020 New England Product Listing2020 New England Product Listing
2020 New England Product Listing
 
Voss on Delaware Contract Law
Voss on Delaware Contract LawVoss on Delaware Contract Law
Voss on Delaware Contract Law
 
Be Confident in Your Research with LexisNexis
Be Confident in Your Research with LexisNexisBe Confident in Your Research with LexisNexis
Be Confident in Your Research with LexisNexis
 
Legal Research Solutions for Correctional Facilities
Legal Research Solutions for Correctional FacilitiesLegal Research Solutions for Correctional Facilities
Legal Research Solutions for Correctional Facilities
 
Real Estate Product Listing
Real Estate Product ListingReal Estate Product Listing
Real Estate Product Listing
 
AHLA Catalog 2019
AHLA Catalog 2019AHLA Catalog 2019
AHLA Catalog 2019
 

Recently uploaded

一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesshobhna jeet
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM Iyogita9398
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawyogita9398
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...ZurliaSoop
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理e9733fc35af6
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 

Recently uploaded (20)

一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
Mischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutesMischief Rule of Interpretation of statutes
Mischief Rule of Interpretation of statutes
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
Types of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM ITypes of Agricultural markets LLB- SEM I
Types of Agricultural markets LLB- SEM I
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
Article 12 of the Indian Constitution law
Article 12 of the Indian Constitution lawArticle 12 of the Indian Constitution law
Article 12 of the Indian Constitution law
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
一比一原版(AUT毕业证书)新西兰奥克兰理工大学毕业证如何办理
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 

Lexis Securities Mosaic - Cybersecurity

  • 1. Cybersecurity In a series of speeches earlier this year, Commodity Futures Trading Commission Chairman Timothy Massad repeated the remark that cybersecurity has become “perhaps the single most important new risk to market integrity and financial stability.” Indeed, with high-profile data breaches seemingly happening more frequently, cybersecurity has become an area of greater emphasis for companies and regulators alike. How can Lexis® Securities Mosaic® help? Securities Mosaic® allows you to conduct research or stay current on a specific topic like cybersecurity across a broad spectrum of materials from a single gateway. Below are some examples. Guidance • In April 2014, the SEC’s Office of Compliance Inspections and Examinations (“OCIE”) announced a series of examinations aimed at identifying cybersecurity risks and assessing cybersecurity preparedness in the securities industry. Following up on that initiative, OCIE recently issued a Risk Alert providing information on the areas of focus for the second round of cybersecurity examinations of broker-dealers and investment advisers. These examinations will involve more testing to assess implementation of firm procedures and controls, and will focus on governance and risk assessment; access rights and controls; data loss prevention; vendor management; training; and incident response. • In Comment Letter review of filings, SEC examiners may ask a company to clarify the technological and administrative procedures it has in place to ensure privacy and security, or to spell out the risks and potential costs of a cyber attack or breach. • In the past two years, not just the SEC but the IRS, Federal Reserve Board, EPA and FDA have offered official guidance or assessment tools in the area of cybersecurity. Find them on Lexis Securities Mosaic by going to our Laws, Rules, Agencies page, searching on “cybersecurity,” and narrowing by the “Guidance” category filter. Disclosure • Risk Factors. Risks disclosed to prospective and current shareholders via periodic reports and in registrations of securities offerings are always a barometer of trending topics. Recently, it has become common practice for companies that maintain access to sensitive or confidential data to disclose risks of potential data breaches or security concerns. • Management’s Discussion & Analysis. When cyber attacks—or even the mere threat of such attacks—impact a company’s bottom line, it will merit discussion in the MD&A section of the annual report. • Proxy statements. Cybersecurity has become a concern at companies’ annual meetings, as companies seek to adopt and refine risk mitigation policies and procedures. The issue can even impact the election of directors and officers, as a candidate’s credentials in the area of cybersecurity may be perceived as increasingly important. Rulemaking • Earlier this year, the SEC formalized certain security standards for exchange-listed companies with the adoption of its final rule 34-73639 on Regulation Systems Compliance and Integrity (“SCI”). • In August, the National Futures Association submitted to the CFTC a proposed interpretive notice focused on cybersecurity. If approved by the CFTC, NFA members would be required to adopt written procedures to keep customer data secure and safeguard access to members’ electronic systems. Lexis® Securities Mosaic®
  • 2. Enforcement • In late September, the SEC announced its first enforcement action related to cybersecurity, fining an investment adviser for failing to establish required policies and procedures in advance of a breach that compromised the personally identifiable information (“PII”) of approximately 100,000 individuals, including thousands of the firm’s clients. Without admitting or denying the allegations, R.T. Jones Capital Equities Management consented to the entry of an order finding that it violated Regulation S-P’s PII safeguard rules during a nearly four-year period when it failed to adopt any written policies and procedures to ensure the security and confidentiality of PII and protect it from anticipated threats or unauthorized access. The firm will pay a $75,000 penalty. News and Commentary • Stay well-informed on everything related to securities. Subscribe to our Daily Securities News in your inbox each morning. This comprehensive newsletter includes SEC updates, corporate and securities news stories from an assortment of notable world news sources, recent law firm memos, market regulation updates, pending securities legislation, SEC enforcement and an SEC Final Rules effective date calendar. • Check out what the top U.S. law firms are saying. Go to our database of over 100,000 Law Firm Memos and type in relevant keywords (e.g., “cybersecurity,” “data breach”). Set up a daily alert to automatically receive the results of your personalized search in your inbox. • See what other influential analysts are saying. Sign up for our Securities Mosaic Blogwatch email, which includes opinion and analysis from well-respected sources such as CorporateCounsel. net and the Harvard Law School Forum on Corporate Governance and Financial Regulation. You can also text-search the past six months of content in our Blogwatch archive. Learn more about Lexis Securities Mosaic and how it can support your business today. Contact us. 866.650.3600 www.lexisnexis.com/lsmsupport LexisNexis, Lexis and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. Securities Mosaic is a registered trademark of LexisNexis, a division of Reed Elsevier Inc. Other products or services may be trademarks or registered trademarks of their respective companies. © 2015 LexisNexis. All rights reserved. 1015